4.9 • 696 Ratings
🗓️ 16 August 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, August 17th, 2016 edition of the Santernet Storm Center's Stormcast. |
0:07.9 | My name is Johannes Ulrich, and I am recording from Stockheim, Germany. |
0:12.1 | One of the frontiers in cryptology right now is something called homomorphic encryption. |
0:18.5 | The idea behind this is that I can take data, I can encrypt it, and then I can |
0:24.6 | apply functions on the data without having to decrypt it first. Of course, this sounds pretty much |
0:31.6 | like magic and as a result it's not easy to get it right. Microsoft, for example, has some limited homomorphic encryption functions that they recently published in the library, |
0:43.3 | but they do not support all kinds of transforms on it, so you are limited to very specific operations that perform on the data. |
0:53.3 | So two years ago, researchers at MIT came up with an encryption scheme that they called |
1:00.5 | a fully homomorphic. |
1:02.3 | So what this means you can encrypt the data and then perform any function on the encrypted |
1:08.0 | data. |
1:09.0 | Sadly, as we learn now, this encryption scheme isn't as secure as it was originally believed. |
1:15.9 | There are some fairly classic weaknesses actually in this encryption scheme. |
1:20.9 | For example, it does allow messages to be broadcast. |
1:25.4 | But then again, if you see the same message multiple times sent to |
1:30.1 | different recipients, each recipient of course would use a different key, you would be able to |
1:36.7 | decrypt the original message. So this was one of the flaws. Other flaws are related to the typical oracles where what you do is you essentially |
1:47.6 | manipulate data, send it to a system that's able to decrypt the data, and then based on the |
1:54.2 | response you get back, you know whether or not you got certain parts of the right. |
1:59.0 | So in short, it's back to the drawing boards for |
2:01.0 | that particular algorithm maybe they'll get it work eventually it's certainly |
2:05.1 | something that's very much missing if you think about a lot of the attacks that |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.